{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:10:26Z","timestamp":1742983826285,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642296147"},{"type":"electronic","value":"9783642296154"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29615-4_7","type":"book-chapter","created":{"date-parts":[[2012,4,23]],"date-time":"2012-04-23T11:30:30Z","timestamp":1335180630000},"page":"82-97","source":"Crossref","is-referenced-by-count":2,"title":["Mental Voting Booths"],"prefix":"10.1007","author":[{"given":"J\u00e9r\u00f4me","family":"Dossogne","sequence":"first","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Lafitte","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","first-page":"335","volume-title":"Proceedings of the 17th Conference on Security Symposium","author":"B. Adida","year":"2008","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: Proceedings of the 17th Conference on Security Symposium, pp. 335\u2013348. USENIX Association, Berkeley (2008)"},{"key":"7_CR2","first-page":"10","volume-title":"Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, EVT\/WOTE 2009","author":"B. Adida","year":"2009","unstructured":"Adida, B., De Marneffe, O., Pereira, O., Quisquater, J.J.: Electing a university president using open-audit voting: analysis of real-world use of helios. In: Proceedings of the 2009 Conference on Electronic Voting Technology\/Workshop on Trustworthy Elections, EVT\/WOTE 2009, p. 10. USENIX Association, Berkeley (2009)"},{"key":"7_CR3","unstructured":"Argonne National Laboratory, The Brad Blog: \u201cMan-in-the-middle\u201d remote attack on Diebold touch-screen voting machine by Argonne national lab (video) (2011), http:\/\/www.youtube.com\/watch?feature=player_embedded&v=DMw2dn6K1oI"},{"key":"7_CR4","unstructured":"Argonne National Laboratory, The Brad Blog: Remote vote tampering attack on a sequoia avc voting machine by argonne national lab (2011)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Backes, M., Hritcu, C., Maffei, M.: Automated verification of remote electronic voting protocols in the applied pi-calculus. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, pp. 195\u2013209. IEEE Computer Society (2008)","DOI":"10.1109\/CSF.2008.26"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"544","DOI":"10.1145\/195058.195407","volume-title":"Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC 1994","author":"J. Benaloh","year":"1994","unstructured":"Benaloh, J., Tuinstra, D.: Receipt-free secret-ballot elections (extended abstract). In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, STOC 1994, pp. 544\u2013553. ACM, New York (1994)"},{"key":"7_CR7","unstructured":"Bohli, J.M., Mueller-Quade, J., Roehrich, S.: Bingo Voting: Secure and coercion-free voting using a trusted random number generator (2007), http:\/\/eprint.iacr.org\/2007\/162"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Canetti, R., Gennaro, R.: Incoercible multiparty computation. In: Annual IEEE Symposium on Foundations of Computer Science, p. 504 (1996)","DOI":"10.1109\/SFCS.1996.548509"},{"key":"7_CR9","unstructured":"Chaum, D.: SureVote: Technical Overview. In: Preproceedings of the Workshop on Trustworthy Elections. In: WOTE 2001 (2001)"},{"key":"7_CR10","unstructured":"Chaum, D.: SureVote: How it works (2011), http:\/\/www.surevote.com\/"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Clark, J., Hengartner, U.: Selections: An internet voting system with over-the-shoulder coercion-resistance. In: Financial Cryptography and Data Security (2011)","DOI":"10.1007\/978-3-642-27576-0_4"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Civitas: Toward a secure voting system. In: IEEE Symposium on Security and Privacy, pp. 354\u2013368. IEEE Computer Society (2008)","DOI":"10.1109\/SP.2008.32"},{"key":"7_CR13","unstructured":"Dall\u2019Olio, E., Markowitch, O.: Voting with designated verifier signature-like protocol. In: International Conference WWW\/Internet, pp. 295\u2013301. IADIS (2004)"},{"key":"7_CR14","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/CSFW.2006.8","volume-title":"IEEE Computer Security Foundations Workshop","author":"S. Delaune","year":"2006","unstructured":"Delaune, S., Kremer, S., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: IEEE Computer Security Foundations Workshop, pp. 28\u201342. IEEE Computer Society, Los Alamitos (2006)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/1400181.1400192","volume":"51","author":"D.L. Dill","year":"2008","unstructured":"Dill, D.L., Castro, D.: Point\/counterpoint: The u.s. should ban paperless electronic voting machines. Commun. ACM\u00a051, 29\u201333 (2008)","journal-title":"Commun. ACM"},{"key":"7_CR16","unstructured":"Dossogne, J., Markowitch, O.: A tripartite strong designated verifier scheme based on threshold rsa signatures. In: International Conference on Security & Management, pp. 314\u2013317. CSREA Press (2009)"},{"key":"7_CR17","unstructured":"Dossogne, J., Markowitch, O.: Online banking and man in the browser attacks, survey of the belgian situation. In: Goseling, J., Weber, J.H. (eds.) Proceedings of the 31th Symposium on Information Theory in the Benelux (WICSITB 2010), Rotterdam, The Netherlands, pp. 19\u201326 (2010)"},{"key":"7_CR18","unstructured":"Friedman, B.: Diebold voting machines can be hacked by remote control (September 27, 2011), http:\/\/politics.salon.com\/2011\/09\/27\/votinghack\/"},{"key":"7_CR19","unstructured":"Friedman, B.: National Security Lab Hacks Diebold Touch-Screen Voting Machine by Remote Control With $26 in Computer (September 27, 2011), http:\/\/www.bradblog.com\/?p=8785"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1022594.1022624","volume":"47","author":"D. Jefferson","year":"2004","unstructured":"Jefferson, D., Rubin, A.D., Simons, B., Wagner, D.: Analyzing internet voting security. Commun. ACM\u00a047, 59\u201364 (2004)","journal-title":"Commun. ACM"},{"key":"7_CR21","first-page":"178","volume-title":"Proceedings of the 1st International Conference on Evoting and Identity","author":"R. Joaquim","year":"2007","unstructured":"Joaquim, R., Ribeiro, C.: CodeVoting protection against automatic vote manipulation in an uncontrolled environment. In: Proceedings of the 1st International Conference on Evoting and Identity, pp. 178\u2013188. Springer, Heidelberg (2007)"},{"key":"7_CR22","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/1102199.1102213","volume-title":"Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005","author":"A. Juels","year":"2005","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp. 61\u201370. ACM, New York (2005)"},{"key":"7_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-642-12980-3_2","volume-title":"Towards Trustworthy Elections","author":"A. Juels","year":"2010","unstructured":"Juels, A., Catalano, D., Jakobsson, M.: Coercion-Resistant Electronic Elections. In: Chaum, D., Jakobsson, M., Rivest, R.L., Ryan, P.Y.A., Benaloh, J., Kutylowski, M., Adida, B. (eds.) Towards Trustworthy Elections. LNCS, vol.\u00a06000, pp. 37\u201363. Springer, Heidelberg (2010)"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1177\/0894439305275851","volume":"23","author":"K. Kenski","year":"2005","unstructured":"Kenski, K.: To I-Vote or Not to I-Vote?: Opinions About Internet Voting from Arizona Voters. Social Science Computer Review\u00a023, 293\u2013303 (2005)","journal-title":"Social Science Computer Review"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11423409_7","volume-title":"Privacy Enhancing Technologies","author":"M.G. Kuhn","year":"2005","unstructured":"Kuhn, M.G.: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol.\u00a03424, pp. 88\u2013107. Springer, Heidelberg (2005)"},{"issue":"2-3","key":"7_CR26","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/j.ipl.2006.08.015","volume":"102","author":"F. Laguillaumie","year":"2007","unstructured":"Laguillaumie, F., Vergnaud, D.: Multi-designated verifiers signatures: anonymity without encryption. Information Processing Letters\u00a0102(2-3), 127\u2013132 (2007)","journal-title":"Information Processing Letters"},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/3-540-46432-8_13","volume-title":"Foundation of Software Science and Computation Structures","author":"F. Laroussinie","year":"2000","unstructured":"Laroussinie, F., Schnoebelen, P.: The State Explosion Problem from Trace to Bisimulation Equivalence. In: Tiuryn, J. (ed.) FOSSACS 2000. LNCS, vol.\u00a01784, pp. 192\u2013207. Springer, Heidelberg (2000)"},{"key":"7_CR28","series-title":"IFIP","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/0-306-47009-8_50","volume-title":"Towards the E-Society","author":"E. Magkos","year":"2002","unstructured":"Magkos, E., Burmester, M., Chrissikopoulos, V.: Receipt-freeness in large-scale elections without untappable channels. In: Schmid, B., Stanoevska-Slabeva, K., Tschammer, V. (eds.) Towards the E-Society. IFIP, vol.\u00a074, pp. 683\u2013693. Springer, Boston (2002)"},{"key":"7_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/11818175_22","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"T. Moran","year":"2006","unstructured":"Moran, T., Naor, M.: Receipt-Free Universally-Verifiable Voting with Everlasting Privacy. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 373\u2013392. Springer, Heidelberg (2006)"},{"issue":"3","key":"7_CR30","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1016\/j.csi.2006.06.001","volume":"29","author":"G.Z. Qadah","year":"2007","unstructured":"Qadah, G.Z., Taha, R.: Electronic voting systems: Requirements, design, and implementation. Computer Standards & Interfaces\u00a029(3), 376\u2013386 (2007)","journal-title":"Computer Standards & Interfaces"},{"issue":"2","key":"7_CR31","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/j.cose.2005.11.003","volume":"25","author":"K. Sampigethaya","year":"2006","unstructured":"Sampigethaya, K., Poovendran, R.: A framework and taxonomy for comparison of electronic voting schemes. Computers & Security\u00a025(2), 137\u2013153 (2006)","journal-title":"Computers & Security"},{"issue":"6","key":"7_CR32","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.ijinfomgt.2007.08.002","volume":"27","author":"C. Sanford","year":"2007","unstructured":"Sanford, C., Rose, J.: Characterizing eparticipation. International Journal of Information Management\u00a027(6), 406\u2013421 (2007)","journal-title":"International Journal of Information Management"},{"key":"7_CR33","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/1143120.1143128","volume-title":"Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006","author":"F. Tari","year":"2006","unstructured":"Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security, SOUPS 2006, pp. 56\u201366. ACM, New York (2006)"},{"key":"7_CR34","unstructured":"Weldemariam, K., Villafiorita, A.: A survey: Electronic voting development and trends. In: Electronic Voting, pp. 119\u2013131 (2010)"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29615-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:56:56Z","timestamp":1742983016000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29615-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642296147","9783642296154"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29615-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}